]> git.proxmox.com Git - pve-docs.git/blame - pveum.1-synopsis.adoc
storage: pbs: document port option
[pve-docs.git] / pveum.1-synopsis.adoc
CommitLineData
1f554f76
DM
1*pveum* `<COMMAND> [ARGS] [OPTIONS]`
2
e2d681b3 3*pveum acl delete* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
4
5Update Access Control List (add or remove permissions).
6
013dc89f 7`<path>`: `<string>` ::
1f554f76
DM
8
9Access control path
10
2489d6df 11`--groups` `<string>` ::
1f554f76
DM
12
13List of groups.
14
2489d6df 15`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
16
17Allow to propagate (inherit) permissions.
18
2489d6df 19`--roles` `<string>` ::
1f554f76
DM
20
21List of roles.
22
e9cd3bd4
TL
23`--tokens` `<string>` ::
24
25List of API tokens.
26
2489d6df 27`--users` `<string>` ::
1f554f76
DM
28
29List of users.
30
5c1699e5
TL
31*pveum acl list* `[FORMAT_OPTIONS]`
32
33Get Access Control List (ACLs).
34
e2d681b3 35*pveum acl modify* `<path> --roles <string>` `[OPTIONS]`
1f554f76
DM
36
37Update Access Control List (add or remove permissions).
38
013dc89f 39`<path>`: `<string>` ::
1f554f76
DM
40
41Access control path
42
2489d6df 43`--groups` `<string>` ::
1f554f76
DM
44
45List of groups.
46
2489d6df 47`--propagate` `<boolean>` ('default =' `1`)::
1f554f76
DM
48
49Allow to propagate (inherit) permissions.
50
2489d6df 51`--roles` `<string>` ::
1f554f76
DM
52
53List of roles.
54
e9cd3bd4
TL
55`--tokens` `<string>` ::
56
57List of API tokens.
58
2489d6df 59`--users` `<string>` ::
1f554f76
DM
60
61List of users.
62
e2d681b3
TL
63*pveum acldel*
64
65An alias for 'pveum acl delete'.
66
67*pveum aclmod*
68
69An alias for 'pveum acl modify'.
70
71*pveum group add* `<groupid>` `[OPTIONS]`
1f554f76
DM
72
73Create new group.
74
013dc89f 75`<groupid>`: `<string>` ::
1f554f76
DM
76
77no description available
78
2489d6df 79`--comment` `<string>` ::
1f554f76
DM
80
81no description available
82
e2d681b3 83*pveum group delete* `<groupid>`
1f554f76
DM
84
85Delete group.
86
013dc89f 87`<groupid>`: `<string>` ::
1f554f76
DM
88
89no description available
90
5c1699e5
TL
91*pveum group list* `[FORMAT_OPTIONS]`
92
93Group index.
94
e2d681b3 95*pveum group modify* `<groupid>` `[OPTIONS]`
1f554f76
DM
96
97Update group data.
98
013dc89f 99`<groupid>`: `<string>` ::
1f554f76
DM
100
101no description available
102
2489d6df 103`--comment` `<string>` ::
1f554f76
DM
104
105no description available
106
e2d681b3
TL
107*pveum groupadd*
108
109An alias for 'pveum group add'.
110
111*pveum groupdel*
112
113An alias for 'pveum group delete'.
114
115*pveum groupmod*
116
117An alias for 'pveum group modify'.
118
35a75dd3 119*pveum help* `[OPTIONS]`
1f554f76
DM
120
121Get help about specified command.
122
35a75dd3 123`--extra-args` `<array>` ::
1f554f76 124
35a75dd3 125Shows help for a specific command
1f554f76 126
2489d6df 127`--verbose` `<boolean>` ::
1f554f76
DM
128
129Verbose output format.
130
c6d5bae8 131*pveum passwd* `<userid>` `[OPTIONS]`
1f554f76
DM
132
133Change user password.
134
013dc89f 135`<userid>`: `<string>` ::
1f554f76 136
9d2e98ed 137Full User ID, in the `name@realm` format.
1f554f76 138
c6d5bae8
TL
139`--confirmation-password` `<string>` ::
140
141The current password of the user performing the change.
142
d2656385
TL
143*pveum pool add* `<poolid>` `[OPTIONS]`
144
145Create new pool.
146
147`<poolid>`: `<string>` ::
148
149no description available
150
151`--comment` `<string>` ::
152
153no description available
154
155*pveum pool delete* `<poolid>`
156
157Delete pool.
158
159`<poolid>`: `<string>` ::
160
161no description available
162
22deb848 163*pveum pool list* `[OPTIONS]` `[FORMAT_OPTIONS]`
d2656385 164
22deb848
TL
165List pools or get pool configuration.
166
167`--poolid` `<string>` ::
168
169no description available
170
171`--type` `<lxc | qemu | storage>` ::
172
173no description available
174+
175NOTE: Requires option(s): `poolid`
d2656385
TL
176
177*pveum pool modify* `<poolid>` `[OPTIONS]`
178
22deb848 179Update pool.
d2656385
TL
180
181`<poolid>`: `<string>` ::
182
183no description available
184
82551b2b
TL
185`--allow-move` `<boolean>` ('default =' `0`)::
186
187Allow adding a guest even if already in another pool. The guest will be removed from its current pool and added to this one.
188
d2656385
TL
189`--comment` `<string>` ::
190
191no description available
192
82551b2b 193`--delete` `<boolean>` ('default =' `0`)::
d2656385 194
82551b2b 195Remove the passed VMIDs and/or storage IDs instead of adding them.
d2656385
TL
196
197`--storage` `<string>` ::
198
82551b2b 199List of storage IDs to add or remove from this pool.
d2656385
TL
200
201`--vms` `<string>` ::
202
82551b2b 203List of guest VMIDs to add or remove from this pool.
d2656385 204
c5aa7e14
TL
205*pveum realm add* `<realm> --type <string>` `[OPTIONS]`
206
207Add an authentication server.
208
209`<realm>`: `<string>` ::
210
211Authentication domain ID
212
c6d5bae8 213`--acr-values` `^[^\x00-\x1F\x7F <>#"]*$` ::
c30bb419
TL
214
215Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
216
34f3e481
TL
217`--autocreate` `<boolean>` ('default =' `0`)::
218
219Automatically create users if they do not exist.
220
82551b2b 221`--base_dn` `<string>` ::
c5aa7e14
TL
222
223LDAP base domain name
224
82551b2b 225`--bind_dn` `<string>` ::
c5aa7e14
TL
226
227LDAP bind domain name
228
229`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
230
231Path to the CA certificate store
232
4772952b
TL
233`--case-sensitive` `<boolean>` ('default =' `1`)::
234
235username is case-sensitive
236
c5aa7e14
TL
237`--cert` `<string>` ::
238
239Path to the client certificate
240
241`--certkey` `<string>` ::
242
243Path to the client certificate key
244
82551b2b
TL
245`--check-connection` `<boolean>` ('default =' `0`)::
246
247Check bind connection to the server.
248
34f3e481
TL
249`--client-id` `<string>` ::
250
251OpenID Client ID
252
253`--client-key` `<string>` ::
254
255OpenID Client Key
256
c5aa7e14
TL
257`--comment` `<string>` ::
258
259Description.
260
261`--default` `<boolean>` ::
262
263Use this as default realm
264
265`--domain` `\S+` ::
266
267AD domain name
268
269`--filter` `<string>` ::
270
271LDAP filter for user sync.
272
273`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
274
275The objectclasses for groups.
276
82551b2b 277`--group_dn` `<string>` ::
c5aa7e14
TL
278
279LDAP base domain name for group sync. If not set, the base_dn will be used.
280
281`--group_filter` `<string>` ::
282
283LDAP filter for group sync.
284
285`--group_name_attr` `<string>` ::
286
287LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
288
34f3e481
TL
289`--issuer-url` `<string>` ::
290
291OpenID Issuer Url
292
c5aa7e14
TL
293`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
294
295LDAP protocol mode.
296
297`--password` `<string>` ::
298
299LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
300
301`--port` `<integer> (1 - 65535)` ::
302
303Server port.
304
c30bb419
TL
305`--prompt` `(?:none|login|consent|select_account|\S+)` ::
306
307Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
308
309`--scopes` `<string>` ('default =' `email profile`)::
310
311Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
312
c5aa7e14
TL
313`--secure` `<boolean>` ::
314
315Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
316
317`--server1` `<string>` ::
318
319Server IP address (or DNS name)
320
321`--server2` `<string>` ::
322
323Fallback Server IP address (or DNS name)
324
325`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
326
327LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
328
9d2e98ed 329`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
c5aa7e14
TL
330
331The default options for behavior of synchronizations.
332
333`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
334
335Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
336
337`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
338
339Use Two-factor authentication.
340
34f3e481 341`--type` `<ad | ldap | openid | pam | pve>` ::
c5aa7e14
TL
342
343Realm type.
344
345`--user_attr` `\S{2,}` ::
346
347LDAP user attribute name
348
349`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
350
351The objectclasses for users.
352
c30bb419 353`--username-claim` `<string>` ::
34f3e481
TL
354
355OpenID claim used to generate the unique username.
356
c5aa7e14
TL
357`--verify` `<boolean>` ('default =' `0`)::
358
359Verify the server's SSL certificate
360
361*pveum realm delete* `<realm>`
362
363Delete an authentication server.
364
365`<realm>`: `<string>` ::
366
367Authentication domain ID
368
369*pveum realm list* `[FORMAT_OPTIONS]`
370
371Authentication domain index.
372
373*pveum realm modify* `<realm>` `[OPTIONS]`
374
375Update authentication server settings.
376
377`<realm>`: `<string>` ::
378
379Authentication domain ID
380
c6d5bae8 381`--acr-values` `^[^\x00-\x1F\x7F <>#"]*$` ::
c30bb419
TL
382
383Specifies the Authentication Context Class Reference values that theAuthorization Server is being requested to use for the Auth Request.
384
34f3e481
TL
385`--autocreate` `<boolean>` ('default =' `0`)::
386
387Automatically create users if they do not exist.
388
82551b2b 389`--base_dn` `<string>` ::
c5aa7e14
TL
390
391LDAP base domain name
392
82551b2b 393`--bind_dn` `<string>` ::
c5aa7e14
TL
394
395LDAP bind domain name
396
397`--capath` `<string>` ('default =' `/etc/ssl/certs`)::
398
399Path to the CA certificate store
400
4772952b
TL
401`--case-sensitive` `<boolean>` ('default =' `1`)::
402
403username is case-sensitive
404
c5aa7e14
TL
405`--cert` `<string>` ::
406
407Path to the client certificate
408
409`--certkey` `<string>` ::
410
411Path to the client certificate key
412
82551b2b
TL
413`--check-connection` `<boolean>` ('default =' `0`)::
414
415Check bind connection to the server.
416
34f3e481
TL
417`--client-id` `<string>` ::
418
419OpenID Client ID
420
421`--client-key` `<string>` ::
422
423OpenID Client Key
424
c5aa7e14
TL
425`--comment` `<string>` ::
426
427Description.
428
429`--default` `<boolean>` ::
430
431Use this as default realm
432
433`--delete` `<string>` ::
434
435A list of settings you want to delete.
436
437`--digest` `<string>` ::
438
82551b2b 439Prevent changes if current configuration file has a different digest. This can be used to prevent concurrent modifications.
c5aa7e14
TL
440
441`--domain` `\S+` ::
442
443AD domain name
444
445`--filter` `<string>` ::
446
447LDAP filter for user sync.
448
449`--group_classes` `<string>` ('default =' `groupOfNames, group, univentionGroup, ipausergroup`)::
450
451The objectclasses for groups.
452
82551b2b 453`--group_dn` `<string>` ::
c5aa7e14
TL
454
455LDAP base domain name for group sync. If not set, the base_dn will be used.
456
457`--group_filter` `<string>` ::
458
459LDAP filter for group sync.
460
461`--group_name_attr` `<string>` ::
462
463LDAP attribute representing a groups name. If not set or found, the first value of the DN will be used as name.
464
34f3e481
TL
465`--issuer-url` `<string>` ::
466
467OpenID Issuer Url
468
c5aa7e14
TL
469`--mode` `<ldap | ldap+starttls | ldaps>` ('default =' `ldap`)::
470
471LDAP protocol mode.
472
473`--password` `<string>` ::
474
475LDAP bind password. Will be stored in '/etc/pve/priv/realm/<REALM>.pw'.
476
477`--port` `<integer> (1 - 65535)` ::
478
479Server port.
480
c30bb419
TL
481`--prompt` `(?:none|login|consent|select_account|\S+)` ::
482
483Specifies whether the Authorization Server prompts the End-User for reauthentication and consent.
484
485`--scopes` `<string>` ('default =' `email profile`)::
486
487Specifies the scopes (user details) that should be authorized and returned, for example 'email' or 'profile'.
488
c5aa7e14
TL
489`--secure` `<boolean>` ::
490
491Use secure LDAPS protocol. DEPRECATED: use 'mode' instead.
492
493`--server1` `<string>` ::
494
495Server IP address (or DNS name)
496
497`--server2` `<string>` ::
498
499Fallback Server IP address (or DNS name)
500
501`--sslversion` `<tlsv1 | tlsv1_1 | tlsv1_2 | tlsv1_3>` ::
502
503LDAPS TLS/SSL version. It's not recommended to use version older than 1.2!
504
9d2e98ed 505`--sync-defaults-options` `[enable-new=<1|0>] [,full=<1|0>] [,purge=<1|0>] [,remove-vanished=([acl];[properties];[entry])|none] [,scope=<users|groups|both>]` ::
c5aa7e14
TL
506
507The default options for behavior of synchronizations.
508
509`--sync_attributes` `\w+=[^,]+(,\s*\w+=[^,]+)*` ::
510
511Comma separated list of key=value pairs for specifying which LDAP attributes map to which PVE user field. For example, to map the LDAP attribute 'mail' to PVEs 'email', write 'email=mail'. By default, each PVE user field is represented by an LDAP attribute of the same name.
512
513`--tfa` `type=<TFATYPE> [,digits=<COUNT>] [,id=<ID>] [,key=<KEY>] [,step=<SECONDS>] [,url=<URL>]` ::
514
515Use Two-factor authentication.
516
517`--user_attr` `\S{2,}` ::
518
519LDAP user attribute name
520
521`--user_classes` `<string>` ('default =' `inetorgperson, posixaccount, person, user`)::
522
523The objectclasses for users.
524
525`--verify` `<boolean>` ('default =' `0`)::
526
527Verify the server's SSL certificate
528
529*pveum realm sync* `<realm>` `[OPTIONS]`
530
531Syncs users and/or groups from the configured LDAP to user.cfg. NOTE:
532Synced groups will have the name 'name-$realm', so make sure those groups
533do not exist to prevent overwriting.
534
535`<realm>`: `<string>` ::
536
537Authentication domain ID
538
539`--dry-run` `<boolean>` ('default =' `0`)::
540
541If set, does not write anything.
542
543`--enable-new` `<boolean>` ('default =' `1`)::
544
545Enable newly synced users immediately.
546
547`--full` `<boolean>` ::
548
7af2edf9 549DEPRECATED: use 'remove-vanished' instead. If set, uses the LDAP Directory as source of truth, deleting users or groups not returned from the sync and removing all locally modified properties of synced users. If not set, only syncs information which is present in the synced data, and does not delete or modify anything else.
c5aa7e14
TL
550
551`--purge` `<boolean>` ::
552
7af2edf9
TL
553DEPRECATED: use 'remove-vanished' instead. Remove ACLs for users or groups which were removed from the config during a sync.
554
9d2e98ed 555`--remove-vanished` `([acl];[properties];[entry])|none` ('default =' `none`)::
7af2edf9 556
9d2e98ed 557A semicolon-seperated list of things to remove when they or the user vanishes during a sync. The following values are possible: 'entry' removes the user/group when not returned from the sync. 'properties' removes the set properties on existing user/group that do not appear in the source (even custom ones). 'acl' removes acls when the user/group is not returned from the sync. Instead of a list it also can be 'none' (the default).
c5aa7e14
TL
558
559`--scope` `<both | groups | users>` ::
560
561Select what to sync.
562
e2d681b3 563*pveum role add* `<roleid>` `[OPTIONS]`
1f554f76
DM
564
565Create new role.
566
013dc89f 567`<roleid>`: `<string>` ::
1f554f76
DM
568
569no description available
570
2489d6df 571`--privs` `<string>` ::
1f554f76
DM
572
573no description available
574
e2d681b3 575*pveum role delete* `<roleid>`
1f554f76
DM
576
577Delete role.
578
013dc89f 579`<roleid>`: `<string>` ::
1f554f76
DM
580
581no description available
582
5c1699e5
TL
583*pveum role list* `[FORMAT_OPTIONS]`
584
585Role index.
586
e2d681b3 587*pveum role modify* `<roleid>` `[OPTIONS]`
1f554f76 588
e2d681b3 589Update an existing role.
1f554f76 590
013dc89f 591`<roleid>`: `<string>` ::
1f554f76
DM
592
593no description available
594
2489d6df 595`--append` `<boolean>` ::
1f554f76
DM
596
597no description available
598+
599NOTE: Requires option(s): `privs`
600
2489d6df 601`--privs` `<string>` ::
1f554f76
DM
602
603no description available
604
e2d681b3
TL
605*pveum roleadd*
606
607An alias for 'pveum role add'.
608
609*pveum roledel*
610
611An alias for 'pveum role delete'.
612
613*pveum rolemod*
614
615An alias for 'pveum role modify'.
616
1f554f76
DM
617*pveum ticket* `<username>` `[OPTIONS]`
618
619Create or verify authentication ticket.
620
013dc89f 621`<username>`: `<string>` ::
1f554f76
DM
622
623User name
624
4a407cfd 625`--new-format` `<boolean>` ('default =' `1`)::
5370fa8c 626
4a407cfd 627This parameter is now ignored and assumed to be 1.
5370fa8c 628
2489d6df 629`--otp` `<string>` ::
1f554f76
DM
630
631One-time password for Two-factor authentication.
632
2489d6df 633`--path` `<string>` ::
1f554f76
DM
634
635Verify ticket, and check if user have access 'privs' on 'path'
636+
637NOTE: Requires option(s): `privs`
638
2489d6df 639`--privs` `<string>` ::
1f554f76
DM
640
641Verify ticket, and check if user have access 'privs' on 'path'
642+
643NOTE: Requires option(s): `path`
644
2489d6df 645`--realm` `<string>` ::
1f554f76 646
c2993fe5 647You can optionally pass the realm using this parameter. Normally the realm is simply added to the username <username>@<relam>.
1f554f76 648
5370fa8c
TL
649`--tfa-challenge` `<string>` ::
650
651The signed TFA challenge string the user wants to respond to.
652
e2d681b3 653*pveum user add* `<userid>` `[OPTIONS]`
1f554f76
DM
654
655Create new user.
656
013dc89f 657`<userid>`: `<string>` ::
1f554f76 658
9d2e98ed 659Full User ID, in the `name@realm` format.
1f554f76 660
2489d6df 661`--comment` `<string>` ::
1f554f76
DM
662
663no description available
664
2489d6df 665`--email` `<string>` ::
1f554f76
DM
666
667no description available
668
2489d6df 669`--enable` `<boolean>` ('default =' `1`)::
1f554f76 670
e2d681b3 671Enable the account (default). You can set this to '0' to disable the account
1f554f76 672
2489d6df 673`--expire` `<integer> (0 - N)` ::
1f554f76 674
c2993fe5 675Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 676
2489d6df 677`--firstname` `<string>` ::
1f554f76
DM
678
679no description available
680
2489d6df 681`--groups` `<string>` ::
1f554f76
DM
682
683no description available
684
c6d5bae8 685`--keys` `[0-9a-zA-Z!=]{0,4096}` ::
1f554f76
DM
686
687Keys for two factor auth (yubico).
688
2489d6df 689`--lastname` `<string>` ::
1f554f76
DM
690
691no description available
692
e2d681b3 693`--password` `<string>` ::
1f554f76
DM
694
695Initial password.
696
e2d681b3 697*pveum user delete* `<userid>`
1f554f76
DM
698
699Delete user.
700
013dc89f 701`<userid>`: `<string>` ::
1f554f76 702
9d2e98ed 703Full User ID, in the `name@realm` format.
1f554f76 704
5c1699e5
TL
705*pveum user list* `[OPTIONS]` `[FORMAT_OPTIONS]`
706
707User index.
708
709`--enabled` `<boolean>` ::
710
711Optional filter for enable property.
712
e9cd3bd4
TL
713`--full` `<boolean>` ('default =' `0`)::
714
715Include group and token information.
716
e2d681b3 717*pveum user modify* `<userid>` `[OPTIONS]`
1f554f76
DM
718
719Update user configuration.
720
013dc89f 721`<userid>`: `<string>` ::
1f554f76 722
9d2e98ed 723Full User ID, in the `name@realm` format.
1f554f76 724
2489d6df 725`--append` `<boolean>` ::
1f554f76
DM
726
727no description available
728+
729NOTE: Requires option(s): `groups`
730
2489d6df 731`--comment` `<string>` ::
1f554f76
DM
732
733no description available
734
2489d6df 735`--email` `<string>` ::
1f554f76
DM
736
737no description available
738
e2d681b3 739`--enable` `<boolean>` ('default =' `1`)::
1f554f76 740
e2d681b3 741Enable the account (default). You can set this to '0' to disable the account
1f554f76 742
2489d6df 743`--expire` `<integer> (0 - N)` ::
1f554f76 744
c2993fe5 745Account expiration date (seconds since epoch). '0' means no expiration date.
1f554f76 746
2489d6df 747`--firstname` `<string>` ::
1f554f76
DM
748
749no description available
750
2489d6df 751`--groups` `<string>` ::
1f554f76
DM
752
753no description available
754
c6d5bae8 755`--keys` `[0-9a-zA-Z!=]{0,4096}` ::
1f554f76
DM
756
757Keys for two factor auth (yubico).
758
2489d6df 759`--lastname` `<string>` ::
1f554f76
DM
760
761no description available
762
e9cd3bd4
TL
763*pveum user permissions* `[<userid>]` `[OPTIONS]` `[FORMAT_OPTIONS]`
764
765Retrieve effective permissions of given user/token.
766
767`<userid>`: `(?^:^(?^:[^\s:/]+)\@(?^:[A-Za-z][A-Za-z0-9\.\-_]+)(?:!(?^:[A-Za-z][A-Za-z0-9\.\-_]+))?$)` ::
768
769User ID or full API token ID
770
771`--path` `<string>` ::
772
773Only dump this specific path, not the whole tree.
774
ac70d7d1
TL
775*pveum user tfa delete* `<userid>` `[OPTIONS]`
776
5370fa8c 777Delete TFA entries from a user.
ac70d7d1
TL
778
779`<userid>`: `<string>` ::
780
9d2e98ed 781Full User ID, in the `name@realm` format.
ac70d7d1 782
5370fa8c 783`--id` `<string>` ::
ac70d7d1 784
5370fa8c 785The TFA ID, if none provided, all TFA entries will be deleted.
ac70d7d1 786
4a407cfd
TL
787*pveum user tfa list* `[<userid>]`
788
789List TFA entries.
790
791`<userid>`: `<string>` ::
792
793Full User ID, in the `name@realm` format.
794
795*pveum user tfa unlock* `<userid>`
796
797Unlock a user's TFA authentication.
798
799`<userid>`: `<string>` ::
800
801Full User ID, in the `name@realm` format.
802
e9cd3bd4
TL
803*pveum user token add* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
804
805Generate a new API token for a specific user. NOTE: returns API token
806value, which needs to be stored as it cannot be retrieved afterwards!
807
808`<userid>`: `<string>` ::
809
9d2e98ed 810Full User ID, in the `name@realm` format.
e9cd3bd4
TL
811
812`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
813
814User-specific token identifier.
815
816`--comment` `<string>` ::
817
818no description available
819
820`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
821
822API token expiration date (seconds since epoch). '0' means no expiration date.
823
824`--privsep` `<boolean>` ('default =' `1`)::
825
826Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
827
828*pveum user token list* `<userid>` `[FORMAT_OPTIONS]`
829
830Get user API tokens.
831
832`<userid>`: `<string>` ::
833
9d2e98ed 834Full User ID, in the `name@realm` format.
e9cd3bd4
TL
835
836*pveum user token modify* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
837
838Update API token for a specific user.
839
840`<userid>`: `<string>` ::
841
9d2e98ed 842Full User ID, in the `name@realm` format.
e9cd3bd4
TL
843
844`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
845
846User-specific token identifier.
847
848`--comment` `<string>` ::
849
850no description available
851
852`--expire` `<integer> (0 - N)` ('default =' `same as user`)::
853
854API token expiration date (seconds since epoch). '0' means no expiration date.
855
856`--privsep` `<boolean>` ('default =' `1`)::
857
858Restrict API token privileges with separate ACLs (default), or give full privileges of corresponding user.
859
860*pveum user token permissions* `<userid> <tokenid>` `[OPTIONS]` `[FORMAT_OPTIONS]`
861
862Retrieve effective permissions of given token.
863
864`<userid>`: `<string>` ::
865
9d2e98ed 866Full User ID, in the `name@realm` format.
e9cd3bd4
TL
867
868`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
869
870User-specific token identifier.
871
872`--path` `<string>` ::
873
874Only dump this specific path, not the whole tree.
875
876*pveum user token remove* `<userid> <tokenid>` `[FORMAT_OPTIONS]`
877
878Remove API token for a specific user.
879
880`<userid>`: `<string>` ::
881
9d2e98ed 882Full User ID, in the `name@realm` format.
e9cd3bd4
TL
883
884`<tokenid>`: `(?^:[A-Za-z][A-Za-z0-9\.\-_]+)` ::
885
886User-specific token identifier.
887
e2d681b3
TL
888*pveum useradd*
889
890An alias for 'pveum user add'.
891
892*pveum userdel*
893
894An alias for 'pveum user delete'.
895
896*pveum usermod*
897
898An alias for 'pveum user modify'.
899
1f554f76 900